Analysis
-
max time kernel
38s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe
Resource
win10v2004-20221111-en
General
-
Target
88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe
-
Size
102KB
-
MD5
850212ca29c6a5abbae69c9cec4dd08d
-
SHA1
8daf3926832fafa1e8197733f1819546518cee1d
-
SHA256
88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2
-
SHA512
0de8c6177e54ea10c81d922e5e9c7c143b9cfca283b0a7e819f26cc96d25d2baa36f01e33125fbbd8e4e9fcd7e6e17189b6914feb6bdffbdd2be634238c84151
-
SSDEEP
1536:9QxqcQu0XPmEmEcYUpEjCTfaAIW1EvqTlrxtPpFAXF9N/6Sy:y/03mEcppEjCTfaAIWSqTlrbPLEz4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1316 6ty62F8.exe 1160 6ty62F8.exe -
Loads dropped DLL 8 IoCs
pid Process 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 1316 6ty62F8.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1316 set thread context of 1160 1316 6ty62F8.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1544 1160 WerFault.exe 29 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1316 6ty62F8.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1316 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 28 PID 1792 wrote to memory of 1316 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 28 PID 1792 wrote to memory of 1316 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 28 PID 1792 wrote to memory of 1316 1792 88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe 28 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1316 wrote to memory of 1160 1316 6ty62F8.exe 29 PID 1160 wrote to memory of 1544 1160 6ty62F8.exe 31 PID 1160 wrote to memory of 1544 1160 6ty62F8.exe 31 PID 1160 wrote to memory of 1544 1160 6ty62F8.exe 31 PID 1160 wrote to memory of 1544 1160 6ty62F8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe"C:\Users\Admin\AppData\Local\Temp\88643164bad573c750b91f59bc9c3d9ffd1d86b32d885a6aee06403e826e6fe2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\6ty62F8.exe"C:\Users\Admin\AppData\Local\Temp\6ty62F8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\6ty62F8.exe"C:\Users\Admin\AppData\Local\Temp\6ty62F8.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 964⤵
- Loads dropped DLL
- Program crash
PID:1544
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
3KB
MD5d101d07ba61bc6990aac73a0cdd67f4f
SHA1aff942e16e1e952f57cd7e51dc3219f7f7812390
SHA2565b01fe09d445ec0e38b1db3443dd7013bfc2b871fae69a5c0e978fc58b560c05
SHA5129cb17efd8bb5c870ebf7c70870a803a8d7f775596d86165ea2dff0d42f1fa775eef407cd333ee91f866c64074fb82f3e19a1c93a56114a8fc2967e72e88f285b
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575